Android Malware Detection Based on Runtime Behaviour

被引:0
作者
Aktas, Kursat [1 ]
Sen, Sevil [1 ]
机构
[1] Hacettepe Univ, Bilgisayar Muhendisligi Bolumu, WISE Lab, Ankara, Turkey
来源
2018 26TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU) | 2018年
关键词
Android; malware detection; dynamic analysis; machine learning;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As the number of applications on Android markets grows, there is also a significant increase in the number of malicious applications that aim to harm users and devices. Therefore, mobile malware detection systems are developed and deployed for both Android markets and mobile devices. However, most malwares employ techniques such as code obfuscation, dynamic code loading in order to evade from static analysis based detection systems. For this reason, a dynamic analysis based detection method is proposed in this study. By examining the behaviour of malicious applications at runtime, features are extracted to distinguish them from benign applications, and a detection system is developed by using machine learning techniques.
引用
收藏
页数:4
相关论文
共 19 条
  • [1] AHA DW, 1991, MACH LEARN, V6, P37, DOI 10.1007/BF00153759
  • [2] Alpaydin E, 2014, ADAPT COMPUT MACH LE, P115
  • [3] [Anonymous], 2018, INT SEC THREAT REP
  • [4] [Anonymous], 2009, SIGKDD Explorations, DOI DOI 10.1145/1656274.1656278
  • [5] [Anonymous], 2013, DROIDBOX ANDROID APP
  • [6] [Anonymous], INT C WIR COMM MOB C
  • [7] Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
    Arp, Daniel
    Spreitzenbarth, Michael
    Huebner, Malte
    Gascon, Hugo
    Rieck, Konrad
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [8] Random forests
    Breiman, L
    [J]. MACHINE LEARNING, 2001, 45 (01) : 5 - 32
  • [9] Automated Test Input Generation for Android: Are We There Yet?
    Choudhary, Shauvik Roy
    Gorla, Alessandra
    Orso, Alessandro
    [J]. 2015 30TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2015, : 429 - 440
  • [10] Enck W., 2012, P 9 USENIX S OP SYST